We have given Information Technology Presentation Topics for students, teachers, IT & other professionals. These IT presentation topics covers latest IT trends, general IT related and other topics which can be used for seminars, presentations, conferences, ppt presentations etc..

    List of IT related topics for presentations

    10 Gigabit Ethernet

    3D Internet

    3D password

    3-D Printing

    3D Television

    3G Technology

    4G Broadband

    4G Technology

    4G Wireless Systems

    5 Pen PC Technology

    5G Technology

    64-Bit Computing

    AC Performance Of Nanoelectronics

    Access gateways

    Adding Intelligence to Internet

    Airborne Internet

    Ambient Intelligence

    Ambient Intelligence

    Ambiophonics

    An Identity Based Eco-System

    Analytics

    Android

    Anonymous Communication

    Artificial Intelligence

    Artificial Neural Network (ANN)

    Asynchronous Chips

    Attentionomics

    Autonomic Computing

    Barcode Technology

    Bio-inspired Networking

    Biometric Voting System

    Biometrics

    Biometrics in SECURE e-transaction

    Bio-Molecular Computing

    BlackBerry Technology

    Blu Ray Disc

    Blue Brain

    Blue Ray Disc

    Blue Tooth

    Bluejacking

    Bluetooth Technology

    Brain Chips

    Brain Fingerprinting

    Brain Fingerprinting

    Brain Gate

    Breaking the Memory Wall in MonetDB

    Broad Band Over Power Line

    Buffer overflow attack : A potential problem and its Implications

    C#

    Cable Modems

    Capacitive And Resistive Touch Systems

    CAPCHA

    CDMA

    Cellular Communications

    Cellular Neural Network

    Cellular Through Remote Control Switch

    Chameleon Chip

    Cisco IOS Firewall

    Cloud Computing

    Cluster Computing

    Code Division Duplexing

    Combating Link Spam

    Compact peripheral component interconnect

    Computational Visual Attention Systems

    Compute Unified Device Architecture CUDA

    Conditional Access System

    Content Curation and Aggregation

    Content Marketing

    corDECT Wireless in Local Loop System

    Crusoe Processor

    Cybernetic Organism

    Cyberterrorism

    CyberTerrorism

    Cyborgs

    Daknet

    Dashboard

    Data Compression Techniques

    Data Leakage Detection

    Data Privacy

    Data Recovery

    Data Security

    Data Warehousing

    Delay Tolerant Networking

    Design and Analysis of Algoritms

    Desktop Virtualization

    Developer Integration

    Development of the Intenet

    Diamond Chip

    Digital Audio Broadcasting

    Digital curation

    Digital Jewelry

    Digital Subscriber Line

    Digital Watermarking

    DNA Based Computing

    Driving Optical Network Evolution

    Dual Core Processor

    Dynamic Cache Management Technique

    Dynamic Data Grid Replication Strategy

    Dynamic Domain Name Service

    Dynamic Languages

    Dynamic Memory Allocation

    Dynamic Synchronous Transfer Mode

    Dynamic Virtual Private Network

    Dynamically Reconfigurability Computing

    E Cash Payment Systems

    Earth Simulator

    E-Cash Payment System

    EDGE

    Elastic Quotas

    Electronic Banking

    Enhancing LAN Using Cryptography and Other Modules

    Enterprise social collaboration

    Ethernet Passive Optical Network

    Ethical Hacking

    Ethical Hacking

    Extended Mark Up Language

    Extreme Programming (XP)

    Eye Movement-Based Human Computer Interaction Techniques

    Facebook

    Facebook Thrift

    Fiber Channel

    Fiber Distributed Data Interface

    Finger Tracking In Real Time Human Computer Interaction

    Fingerprints Technology

    Firewalls

    Fluorescent Multi-layer Disc

    FRAM

    Free Space Laser Communications

    Free Space Optics

    Free Space Optics

    Freenet

    Futex

    Gaming Consoles

    Generic Access Network

    Generic Framing Procedure

    Generic Visual Perception Processor GVPP

    Genetic Algorithms

    Gi-Fi

    Global Wireless E-Voting

    Google Chrome OS

    Google Glass

    Google Strikes Back

    Google+

    GPRS

    Graph Separators

    Graphical Password Authentication

    Green Cloud

    Green Computing

    GSM

    GSM 900 Mobile Jamme

    Hadoop

    Hadoop

    Handheld Computers

    Hi-Fi

    High Altitude Aeronautical Platforms

    High Altitude Aeronautical Platforms

    High Performance DSP Architectures

    Holographic Data Storage

    Holographic Memory

    HPJava

    HSDPA

    Human Computer Interface

    Hurd

    HVAC

    Hyper-Threading technology

    I-Cloud by Apple

    IDC

    iDEN

    IDS

    Image Identification System

    IMode

    In Vehicle Networking

    Incognito mode

    InfiniBand

    Infinite Dimensional Vector Space

    Instant Messaging

    Integer Fast Fourier Transform

    Integrated Voice and Data

    Intel Centrino Mobile Technology

    Intel Core I7 Processor

    Intelligent Software Agents

    Intelligent Speed Adaptation

    Internet Access via Cable TV Network

    Internet of Things

    Internet Telephony Policy in INDIA

    Introduction to the Internet Protocols

    Intrusion Tolerance

    Intrution Detection System

    Intrution Detection Systems

    In-Vehicle Networking

    Inverse Multiplexing

    Inverse Multiplexing

    IP spoofing

    IP Telephony

    iPad

    iPhone

    Ipv6 – The Next Generation Protocol

    IPv6 Protocol

    Iris Scanning

    Iris Scanning

    Java Database Connectivity

    Java Ring

    JOOMLA and CMS

    Keil C

    Keyboard without Keys and Board

    Laptop Computer

    Large Cloud Services

    Layer 3 Switching

    Light emitting polymers

    Light Tree

    Location Dependent Query Processing

    Low Power UART Design for Serial Data Communication

    LWIP

    MANET

    M-Commerce

    Media Fragmentation

    Middleware

    Migration From GSM Network To GPRS

    Millipede

    Mind Reading Computer

    Mind-Reading Computer

    MiniDisc system

    Mobile Computing

    Mobile IP

    Mobile Phone Cloning

    Mobile Security

    Mobile TV

    Mobile Virtual Reality Service

    Mobile WiMax

    Mobile WiMAX

    Modems and ISDN

    Modular Computing

    Money Pad, The Future Wallet

    Motes

    MPEG Video Compression

    MPEG-7

    Multi Touch Technology

    Multicast

    Multiterabit Networks

    Nano Cars Into The Robotics

    Nanorobotics

    Network Security Firewalls

    Network Traffic Analyzer

    Networking

    Neural Interfacing

    Neural Networks And Their Applications

    Nokia Morph

    No-Touch Interfaces

    NRAM

    NVIDIA Tesla Personal Supercomputer

    On-line Analytical Processing (OLAP)

    Online Video Streaming

    Open source

    Operating Systems

    Optical Computer

    Optical Fibre Cable

    Optical Free Space Communication

    Optical packet switch architectures

    Optical Packet Switching Network

    Optical Satellite Communication

    Optical Switching

    Orthogonal Frequency Division Multiplplexing

    Ovonic Unified Memory

    Packet Sniffers

    Palladium

    Palm Vein Technology

    Parallel Computing In India

    Parallel Databases

    Param 10000

    Pendrives

    Personal Cloud Services

    personal clouds accelerates

    Phishing

    Phishing Technology

    Pill Camera

    Pivot Vector Space Approach in Audio-Video Mixing

    Plagiarism Detection Techniques

    Planar Separators

    Plastic Memory

    Plastic Memory

    Platform Architectures

    PON Topologies

    Project Oxygen

    Protein Memory

    Public Key Infrastructure

    QoS in Cellular Networks Based on MPT

    Quadrics Interconnection Network

    Quantum Computing

    Quantum Cryptography

    Quantum Information Technology

    Radio Frequency Light Sources

    Radio Network Controller

    RAIN technology

    Rapid Prototyping

    Real Time Content

    Real- Time Systems and Real- Time Operating Systems

    Refactoring

    Resilient Packet Ring Technology

    Robotic Surgery

    Rover Technology

    RPR

    SAM

    Satellite Radio

    SATRACK

    Seam Carving for Media Retargeting

    Search by Image

    Search Leads To Sales

    Secure ATM by Image Processing

    Security Features of ATM

    Self Defending Networks

    Self Organizing Maps

    Self-Managing Computing

    Semantic Digital Library

    Sense-Response Applications

    Sensors on 3D Digitization

    Setting up a LAN using Linux

    Short Message Service (SMS)

    Significance of real-time transport Protocol in VOIP

    Silent Sound Technology

    Sixth Sense Technology

    Skinput Technology

    Smart card

    Smart Cards

    Smart Fabrics

    Smart Note Taker

    Smart Pixel Arrays

    Smart Quill

    Sniffer for detecting lost mobiles

    Social Literacy Skills

    Social Media Privacy

    Social Media Schizophrenia

    Social Networks That Are IT Policy Friendly

    Social Platforms

    Socket Programming

    Soft Computing

    Software Reuse

    Space Communications Protocol

    Space Mouse

    SPECT

    Speech Application Language Tags

    Speed Detection of moving vehicle using speed cameras

    Spyware

    Storage Area Networks

    Store Management System

    Structured Cabling

    Surface Computer

    Survivable Networks Systems

    Swarm intelligence & traffic Safety

    Synchronous Optical Networking

    SyncML

    Synthetic Aperture Radar System

    Tablets

    TCP/ IP

    TCPA / Palladium

    Tele Immersion

    Tele-immersion

    Tempest and Echelon

    Terrestrial Trunked Radio

    Text Mining

    The integration Technology

    The Mobile Revolution

    Third Generation

    Thought Leadership

    Tool Command Language

    Touch Screens

    Touch Screens

    Transmedia Storytelling

    Tripwire

    Tsunami Warning System

    Ubiquitous Networking

    Ubiquitous Social Computing

    UMTS

    Unicode And Multilingual Computing

    Unified Modeling Language (UML)

    Unlicensed Mobile Access

    VHDL

    Virtual Instrumentation

    Virtual keyboard

    Virtual LAN Technology

    Virtual MArketing

    Virtual Private Network

    Virtual Private Network

    Virtual Reality

    Virtualization

    Viruses, vulnerabilities and security holes

    Visible Light Communication

    VoCable

    Voice morphing

    Voice Over Internet Protocol

    Voice Portals

    Voice Portals

    Voice Quality

    Wardriving

    Wearable Bio-Sensors

    Wearable Technology

    Why Microsoft Surface failed?

    Windows 8

    Windows DNA

    Wireless Application Protocol

    Wireless Application Protocoll

    Wireless Fidelity

    Wireless Internet

    Wireless Networked Digital Devices

    Wireless Technology

    Wireless USB

    Wireless Video Service in CDMA Systems

    Wolfram Alpha

    Word Sense Disambiguation

    Workplace Monitoring

    X- Internet

    XML Encryption

    XML Encryption

    Y2K38

    Yii Framework

    Zero Knowledge Protocols and Proof Systems

    Zettabyte FileSystem

    ZigBee Technolgy